Faculty of Information Technology, BUT

Publication Details

Analysis of Authentication Protocols with Scyter: Case Study

OČENÁŠEK Pavel. Analysis of Authentication Protocols with Scyter: Case Study. In: Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science, vol. 6771. Berlin Heidelberg: Springer Verlag, 2011, pp. 359-365. ISBN 978-3-642-21792-0.
Czech title
Analýza autentizačních protokolů pomocí Scyter: případová studie
Type
conference paper
Language
english
Authors
Keywords
Analysis, authentication protocol, Scyter, case study
Abstract
The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.
Published
2011
Pages
359-365
Proceedings
Human Interface and the Management of Information. Interacting with Information
Series
Lecture Notes in Computer Science
Volume
6771
Conference
HCII 2011, Orlando, US
ISBN
978-3-642-21792-0
Publisher
Springer Verlag
Place
Berlin Heidelberg, DE
BibTeX
@INPROCEEDINGS{FITPUB9497,
   author = "Pavel O\v{c}en\'{a}\v{s}ek",
   title = "Analysis of Authentication Protocols with Scyter: Case Study",
   pages = "359--365",
   booktitle = "Human Interface and the Management of Information. Interacting with Information",
   series = "Lecture Notes in Computer Science",
   volume = 6771,
   year = 2011,
   location = "Berlin Heidelberg, DE",
   publisher = "Springer Verlag",
   ISBN = "978-3-642-21792-0",
   language = "english",
   url = "https://www.fit.vut.cz/research/publication/9497"
}
Back to top